Protecting Customer Data in Our Cloud through Microsoft Azure

Last month, Microsoft published helpful guidance for IT Professionals looking to maximize the protection of their data using the tools and technologies available in the Azure platform and related services for encryption, access control and other aspects of data security. This paper, entitled “Protecting Data in Microsoft Azure” explores key areas that should be considered when using either the platform (PaaS), infrastructure (IaaS) or a hybrid database solution. Topics covered in the paper include:

Data Storage in Microsoft Azure

Understanding Data Security

Customer-Configurable Protection

Protecting data Through Redundancy and Backup

Privacy and Accountability

There are multiple tools within Microsoft Azure to help safeguard data according to your company’s security and compliance needs. One of the keys to data protection in the cloud is accounting for the possible states in which your data may occur, and what controls are available for that state. Key considerations for protecting data must address data at rest, in process, and in transit. This paper explores the essentials of all three states, and provide guidance on how the capabilities can be implemented for use. Additionally the paper provides customers with the insight to protecting a cloud implementation of a SQL server database. The guidance looks at key differences on encrypting data at the record level vs volume level encryption techniques in a hybrid model.

Whether you are considering deployment of a hybrid, or cloud based solution, this paper is a recommended read in helping protect your organization’s information.

Featured Posts

In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how rapid cyberattacks are different in terms of execution and outcome. In the second blog post, we provided some details on Petya and how it worked. In this final blog post, we will share: Microsoft’s roadmap of recommendations...

The word strategy has its origins in the Roman Empire and was used to describe the leading of troops in battle. From a military perspective, strategy is a top-level plan designed to achieve one or more high-order goals. A clear strategy is especially important in times of uncertainty as it provides a framework for those...

Last week the technology industry and many of our customers learned of new vulnerabilities in the hardware chips that power phones, PCs and servers. We (and others in the industry) had learned of this vulnerability under nondisclosure agreement several months ago and immediately began developing engineering mitigations and updating our cloud infrastructure. In this blog,...

For several years now, policymakers and practitioners from governments, CERTs, and the security industry have been speaking about the importance of public-private partnerships as an essential part of combating cyber threats. It is impossible to attend a security conference without a keynote presenter talking about it. In fact, these conferences increasingly include sessions or entire...